Cybersecurity Midterm

Cybersecurity Midterm

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Network Protocols and Layers

Network Protocols and Layers

9th - 10th Grade

19 Qs

Internet

Internet

9th Grade

15 Qs

Cyber security

Cyber security

10th - 11th Grade

19 Qs

Phishing

Phishing

7th - 9th Grade

15 Qs

IGCSE ICT quiz

IGCSE ICT quiz

9th - 10th Grade

15 Qs

Computer Networks Review

Computer Networks Review

9th - 12th Grade

20 Qs

client server

client server

10th - 11th Grade

21 Qs

Outlook Ch. 1

Outlook Ch. 1

8th - 9th Grade

20 Qs

Cybersecurity Midterm

Cybersecurity Midterm

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Nathan Denton

Used 24+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Tatiana is trying to upload her homework submission before the midnight deadline. As she tries to upload the document, the site crashes and she is unable to submit her work by the due date.

Confidentiality

Integrity

Availability

All of the above

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following devices is a part of the Internet of Things?

A watch that must be set manually

A security system that only sounds an alarm if the code is not entered correctly

A physical combination padlock for your gym locker

A car with a built-in navigation system

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not true about the Internet of Things?

It is the network of devices with the ability to connect and exchange data

It increases our vulnerability to cyber attacks

There are no negative consequences to increased connectivity

It is growing exponentially

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following pieces of information would be safe to include in an online username?

School mascot

Favorite Sport

Year of birth

City of residence

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a characteristic of a credible source?

The author is not named on the website

The domain is .edu or .gov

Multiple scholarly sources are cited

The source is well-organized and follows rules of spelling and grammar

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A type of malware that steals and holds your data hostage until you pay a fee is called ____.

Phishing

Ransomware

Hackerware

Spyware

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Mariel comes across an urgent email in her inbox. It looks to be from her bank letting her know that her account has been deactivated due to suspicious activity. There is a link in the email for her to click to verify recent purchases. There is also a file attached named June Statement. Which action is the best for Mariel to take?

Call her bank or go directly to the bank's website to confirm whether the email is legitimate or not.

Assume that the email is a phishing email and delete it.

Download the attached file to confirm whether the email is legitimate or not

Click on the link in the email, but be wary of any information that is requested.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?